Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 05:35
Behavioral task
behavioral1
Sample
JaffaCakes118_3e320f57653d1649d78d456ca72fd870.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3e320f57653d1649d78d456ca72fd870.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3e320f57653d1649d78d456ca72fd870.exe
-
Size
109KB
-
MD5
3e320f57653d1649d78d456ca72fd870
-
SHA1
639f1bff4a48ca6d6b2a1d8b0d8bbbd64c402f9f
-
SHA256
09f0090e02a25a645d7dcad8dae07c977b713addd3a0e639a283f70901f2d0cc
-
SHA512
2972bc1c42e27c6bead159e2bfb248b52adf4ca5703111f4a0118c8443d3cd9cd63f32d5ca9a973276ac457c066f76345831b51b61d4d9d458c55dffd3ddf504
-
SSDEEP
1536:IVH8uMsa6kRfJirY84erfImafc61JfcUcKDRA8/HUtpFXCAIw:IZ8uVa6wiraf91JcUcw/HUtpFXCAIw
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2484-0-0x0000000000400000-0x000000000041D000-memory.dmp family_gh0strat behavioral1/files/0x00070000000120fe-2.dat family_gh0strat behavioral1/memory/2484-4-0x0000000000400000-0x000000000041D000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\mdmserver\Parameters\ServiceDll = "C:\\Program Files (x86)\\Common Files\\main.dll" JaffaCakes118_3e320f57653d1649d78d456ca72fd870.exe -
Loads dropped DLL 1 IoCs
pid Process 2288 svchost.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\main.dll JaffaCakes118_3e320f57653d1649d78d456ca72fd870.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e320f57653d1649d78d456ca72fd870.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e320f57653d1649d78d456ca72fd870.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in Program Files directory
PID:2484
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD5fd67736339a20198fe91e4df283fc760
SHA15ec1dbec989b47f005bffee2383df4643f7a141a
SHA2569eea4b7744a4b520457ca971fdc1d50c4b2fb1edf14a7eac14761c220d71ff3f
SHA512b547a73b45053205d1d7da161890abe90a64aee43b3e2b16a2f0f11c7148cda5b5e8337f07f9dd86c7bae30daf29e19ab9e3e3e6779cb70cd80be38607836282